• 462 Citations
  • 12 h-Index
1993 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2008

Simple direct reduction of string (1,2)-OT to Rabin's OT without privacy amplification

Kurosawa, K. & Koshiba, T., 2008 Oct 27, Information Theoretic Security - Third International Conference, ICITS 2008, Proceedings. p. 199-209 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5155 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2007

Low-density attack revisited

Izu, T., Kogure, J., Koshiba, T. & Shimoyama, T., 2007 Apr 1, In : Designs, Codes, and Cryptography. 43, 1, p. 47-59 13 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

More on security of public-key cryptosystems based on chebyshev polynomials

Cheong, K. Y. & Koshiba, T., 2007 Sep, In : IEEE Transactions on Circuits and Systems II: Express Briefs. 54, 9, p. 795-799 5 p.

Research output: Contribution to journalArticle

17 Citations (Scopus)
2006

Progress in quantum computational cryptography

Kawachi, A. & Koshiba, T., 2006 Aug 11, In : Journal of Universal Computer Science. 12, 6, p. 691-709 19 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Quantum computational cryptography

Kawachi, A. & Koshiba, T., 2006 Jun 10, Quantum Computation and Information: From Theory to Experiment. Imai, H. & Hayashi, M. (eds.). p. 167-184 18 p. (Topics in Applied Physics; vol. 102).

Research output: Chapter in Book/Report/Conference proceedingChapter

2005

Computational indistinguishability between quantum states and its cryptographic application

Kawachi, A., Koshiba, T., Nishimura, H. & Yamakami, T., 2005, In : LECTURE NOTES IN COMPUTER SCIENCE. 3494, p. 268-284 17 p.

Research output: Contribution to journalConference article

Open Access
29 Citations (Scopus)

Universal test for quantum one-way permutations

Kawachi, A., Kobayashi, H., Koshiba, T. & Putra, R. H., 2005 Nov 22, In : Theoretical Computer Science. 345, 2-3, p. 370-385 16 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2004

Short exponent diffie-hellman problems

Koshiba, T. & Kurosawa, K., 2004 Jan 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bao, F., Deng, R. & Zhou, J. (eds.). Springer Verlag, p. 173-186 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2947).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
13 Citations (Scopus)

Theoretical Analysis of χ2 Attack on RC6

Takenaka, M., Shimoyama, T. & Koshiba, T., 2004 Jan, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 1, p. 28-36 9 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Universal test for quantum one-way permutations

Kawachi, A., Kobayashi, H., Koshiba, T. & Putra, R. H., 2004 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3153, p. 839-850 12 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2003

Theoretical analysis of η2 attack on RC6

Takenaka, M., Shimoyama, T. & Koshiba, T., 2003 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2727 LNCS, p. 142-153 12 p.

Research output: Contribution to journalConference article

2 Citations (Scopus)
2002

Multiple linear cryptanalysis of a reduced round RC6

Shimoyama, T., Takenaka, M. & Koshiba, T., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Springer Verlag, Vol. 2365. p. 76-88 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

On sufficient randomness for secure public-key cryptosystems

Koshiba, T., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2274. p. 34-47 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2001

A new aspect for security notions: Secure randomness in public-key encryption schemes

Koshiba, T., 2001, Public Key Cryptography - 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Proceedings. Springer Verlag, Vol. 1992. p. 87-103 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1992).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Polynomial-time algorithms for the equivalence for one-way quantum finite automata

Koshiba, T., 2001 Dec 1, Algorithms and Computation - 12th International Symposium, ISAAC 2001, Proceedings. p. 268-278 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2223 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

The decision diffie-hellman assumption and the quadratic residuosity assumption

Saito, T., Koshiba, T. & Yamamura, A., 2001 Jan, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E84-A, 1, p. 165-171 7 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2000

A technique for boosting the security of cryptographic systems with one-way hash functions

Koshiba, T., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Springer Verlag, Vol. 1787. p. 76-81 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
1999

Inferring pure context-free languages from positive data

Koshiba, T., Mäkinen, E. & Takada, Y., 1999 Jan 1, In : Acta Cybernetica. 14, 3, p. 469-477 9 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)
1998

Enhancing D-ABDUCTOR towards a diagrammatic user interface platform

Misue, K., Nitta, K., Sugiyama, K., Koshiba, T. & Inder, R., 1998 Dec 1, p. 359-368. 10 p.

Research output: Contribution to conferencePaper

12 Citations (Scopus)
1997

Learning deterministic even linear languages from positive examples

Koshiba, T., Mäkinen, E. & Takada, Y., 1997 Oct 10, In : Theoretical Computer Science. 185, 1, p. 63-79 17 p.

Research output: Contribution to journalArticle

19 Citations (Scopus)

On a hierarchy of slender languages based on control sets

Koshiba, T., 1997 Jul, In : Fundamenta Informaticae. 31, 1, p. 41-47 7 p.

Research output: Contribution to journalArticle

1996

A Machine Learning Approach to Knowledge Acquisitions from Text Databases

Sakakibara, Y., Misue, K. & Koshiba, T., 1996, In : Plastics, Rubber and Composites Processing and Applications. 8, 3, p. 309-324 16 p.

Research output: Contribution to journalArticle

Decision tree learning system with switching evaluator

Koshiba, T., 1996, Advances in Artificial Intelligence - 11th Biennial Conference of the Canadian Society for Computational Studies of Intelligence, AI 1996, Proceedings. Springer Verlag, Vol. 1081. p. 349-361 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1081).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1995

Learning strongly deterministic even linear languages from positive examples

Koshiba, T., Mäkinen, E. & Takada, Y., 1995, Algorithmic Learning Theory - 6th International Workshop, ALT 1995, Proceedings. Springer Verlag, Vol. 997. p. 41-54 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 997).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Typed pattern languages and their learnability

Koshiba, T., 1995 Jan 1, Computational Learning Theory - 2nd European Conference, EuroCOLT 1995, Proceedings. Vitanyi, P. (ed.). Springer Verlag, p. 367-379 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 904).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)
1993

Text classification and keyword extraction by learning decision trees

Sakakibara, Y., Misue, K. & Koshiba, T., 1993 Jan 1, Proceedings of the Conference on Artificial Intelligence Applications. Publ by IEEE, 1 p. (Proceedings of the Conference on Artificial Intelligence Applications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)